Cyber Security in the Utility Industry Institute for Regulatory Policy Studies The Environmentally Concerned, Budget Conscious, Technically Savvy Public Utility Mark Guth Manager, Information Security Compliance 29Sep16 Agenda 1. Mobile Application Trends 2. Cloud Computing Challenges 3. Utility Industry Cyber Security Challenges - Events a. Ukrainian Electric Power Grid Attack b. SSL/TLS Vulnerabilities and Extension c. SCG Phishing Emails and Malware 2016 d. Recently Retired IT Platforms e. Elevated Rights and Escalated Privileges 4. Lessons Learned 5. Questions Southern Company Gas Confidential Use Only 2 1. Mobile Applications – Utility Industry Trends Customer Centric Mobility New Breed of Customers - Generation Y or “Millennials” - Smart Phone Savvy Mobile Apps Fits in with Utility “Go Green” Strategy Using Content Marketing to Engage Customers – Blogs, Long-form Content, Infographics, etc.12 Company Centric Mobility Smart Metering/Smart Grid New Breed of Employees - Generation Y – Mobility is a Perk Southern Company Gas Confidential Use Only 3 1. Mobile Applications – Trends (Continued) Mobile Application Security Concerns: Mobile Devices Provide Information to the Application About What Device is Being Used and the Application Adapts to the Characteristics of to the Device – Hackers can use that information. Limited Quality Assurance on the Security of Apps in the Android App Store (90%+ may contain Malware) Utilities cannot control the security of a customer’s device – Jail Broken Phones. Mobile Applications have Increasingly More Complex Functionality Offered to Customers. Southern Company Gas Confidential Use Only 4 1. Mobile Applications – Trends (Continued) Mobile Application Security Mitigation Strategies 1. Employ Rigorous Testing Processes to Ensure Application Functions Properly for all Device Types 2. Code the Mobile Application to Make Multiple Checks on the Security of the Mobile Device Itself – Reject Jailbroken Phone From Connecting 3. Join Open Web Application Security Project (OWASP) – Multiple Resources for Secure Coding and Testing of Web Applications 4. Don’t Store PII or PCI on Device or Application Southern Company Gas Confidential Use Only 5 2. Cloud Computing – Rise of the Machines Cloud Computing1 – In computer •networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet, similar to utility computing. In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time. Search for Extra-Terrestrial Intelligence SETI@Home started in 19992 Southern Company Gas Confidential Use Only 6 2. Cloud Computing – Platforms Software As A Service (SAAS) Salesforce, Gmail, GoogleDocs Platform As A Service (PAAS) Amazon Web Services, Openstack, Windows Azure Infrastructure As A Service (IAAS) - AT&T, Rackspace, Verizon Southern Company Gas Confidential Use Only 7 2. Cloud Computing – Security Challenges Energy Efficiency Programs – Good Cloud Deployment Candidates Low Cost to Entry, Quick Deployment Times, Easy to Exit! Cloud Security Challenges – Where is your data stored (location may make a legal difference)? Who has access to your data? Is your data Co-mingled with other companies’ data? How Long Does Your Cloud Provider Keep Your Data? Southern Company Gas Confidential Use Only 8 2. Cloud Computing – Security Challenges (Continued) How to Mitigate Cloud Security Risks: Bring Information Security into the Process Early Become Member of Cloud Security Alliance3 – Great Resources at - https://cloudsecurityalliance.org/ Look for Vendor Certifications - SSAE16, PCI, ISO 27001 to Pass Some Risk to Vendor Imbed Strong Security Elements Within Contractual Language to Extend Your Security Controls to Cloud Providers Refrain from storing confidential data in Cloud – Less Exposure As Accountants, Consider TCO when Considering cloud options for the Business Southern Company Gas Confidential Use Only 9 2. Cloud Computing – Security Challenges (Continued) Recent Developments – ASU 2015-05 Cloud Accounting Notes – GAAP Accounting promotes Tax Advantages to CAPEX. Cloud has been mainly considered OPEX but recent ruling/guidance have been made. Local PUC’s are asking questions how to use the Cloud to lower costs to rate payers. Definition of CAPEX Cloud – Must meet both of these criteria: 1. Company has the contractual right to take possession of the code without significant penalty*, and 2. We can feasibly run the software on our own hardware, or hardware we independently host with another third party. Southern Company Gas Confidential Use Only 10 3. Utility Industry Cyber Security Challenges Recent Cyber Security Events and Trends Affecting Utilities: A: Ukrainian Power Outage B: SSL/TLS Vulnerabilities (HTTPS) C: Phishing Emails and Malware D: Recent IT Platform Retirements E: Elevated User Access/Privilege Escalation Southern Company Gas Confidential Use Only 11 3A. Utility Industry Cyber Security Challenges – Events Ukrainian Power Outage Ukrainian Power Outage December 23rd, 2015: • At 3:55 PM, Technician Witnesses Electric HMI Screens Misbehaving • 27 Transformers Knocked Offline • 80,000 Customers in Dark. • Call Center Overwhelmed with Fake Customer Calls • Two Other Oblenergos (Electric Utilities) Suffered Similar Events Affecting a Total of 225,000 Customers • Outages Lasted 6 Hours Southern Company Gas Confidential Use Only 12 3A. Utility Industry Cyber Security Challenges – Events Ukrainian Power Outage (Continued) Ukrainian Power Outage Kill Chain Steps 1-5: • Phishing emails sent to SCADA Admins (6 months before attack) and use of malicious Microsoft Office attachments. • Admin clicks allowed for installation of Black Energy Malware that to led to Theft of Legitimate User Credentials. • Threat Actors Accessed Networks and Mapped Out Network Topology and Connections. • Threat Actors Installed Remote Access Software for the human-machine interface (HMI). • Threat Actors Developed Malicious Firmware for SCADA Devices. • Threat Actors Deployed Kill Disk to ICS and corporate network systems Southern Company Gas Confidential Use Only 13 3A. Utility Industry Cyber Security Challenges – Events Ukrainian Power Outage (Continued) Ukrainian Power Outage Kill Chain Steps 6-7 : 7 • Threat Actors Leveraged Legitimate Remote Access Pathways (VPNs), using Legitimate User Credentials to Log Into the HMI Machines. • Executed Disconnect Commands for Electric Substations Cutting Off Electricity to Thousands of Customer. • Executed Firmware Overwrites that Disabled or Destroy field equipment • Executed Kill Disk Software on Workstations • Executed Unauthorized Disconnects of Data Center Uninterruptable Power Supplies (UPS) to Take Data Center Devices Offline. • Use of Telephone Denial of Service (TDoS) to disrupt customer restoration. Southern Company Gas Confidential Use Only 14 3B. Utility Industry Cyber Security Challenges – Events SSL/TLS Vulnerabilities SSL (Secure Sockets Layer)/TLS (Transport Layer) Vulnerabilities: CVE-2015-0204 • During the late 1990’s, early 2000’s, more secure methods of encryption were developed. But US export laws allowed older and less secure keys to be included. • As those less secure keys were compromised, hackers figured out how to exploit their use. • Hundreds of thousands of web Sites still rely on SSL or TLS For HTTPS encryption Southern Company Gas Confidential Use Only 15 3C. Utility Industry Cyber Security Challenges – Events SCG Phishing Emails and Malware 2016 1. SCG Blocks more than 20 Executive Phishing Emails Daily 2. Domain Typo Squatting – Registering a Domain Name Close to AGLResources.com to Trick Employees to Click on email links: Glresources.com Alresources.com Agresources.com Aglresoures.com Aglresource.com Agllresources.com Aglressources.com Algresources.com Aglresuorces.com Aglresoruces.com Atlresources.com Ag1resources.com 3. Cyber Triage Team Responded to over 1100 Workstation Infection Attempts in the first 6 months of 2016 – only one Actual Infection 4. Internet Content Filtering Tools Blocked More Than 1300 Malicious Web Site Access Attempts in the first half of 2016 Southern Company Gas Confidential Use Only 16 3C. Utility Industry Cyber Security Challenges – Events Phishing Emails – Actual Examples Targeting Executives Southern Company Gas Confidential Use Only 17 3C. Utility Industry Cyber Security Challenges – Events Phishing Emails – Actual Examples Targeting Executives Southern Company Gas Confidential Use Only 18 3D. Utility Industry Cyber Security Challenges – Events Recently Retired IT Platforms Impact of Retired Vendor Platforms: No more security updates for known issues. Vulnerabilities identified in the future will not be fixed. Significant Number of Machines still need to be upgraded or replaced. MS:Windows Server 2003 Support Ended 7/14/15 MS:Windows XP Support Ended 4/08/14 MS: Internet Explorer 8.0 Support Ended 1/14/16 MS: SQL 2005 Support Ends 4/12/16 MS: .Net 4.5.1 Support Ended 1/12/16 Users – Prepare for Change! SSL 1.0, 2.0, 3.0 Compromised 2014 Pressure Vendors to Stay Current! Adobe X - 11/18/2015 Southern Company Gas Confidential Use Only 19 3E. Utility Industry Cyber Security Challenges – Events Elevated Rights and Escalated Privileges Escalated Privilege Risk: • The #2 VERIS Threat Actions for confirmed data breaches over the previous three years is the use of stolen credentials. 10 • 60% of all attacks in 2015 were by an insider, whether malicious or inadvertent.11 • Inadvertent – Make a Mistake • Intentional – Plan to Act Inappropriately • Misappropriated – Credentials Stolen Southern Company Gas Confidential Use Only 20 4. Utility Industry Cyber Security Challenges Events Lessons Learned Lessons Learned Improve Training and Incident Response Processes – Technology Not Enough – People Remain Still The Weakest Link (Phishing, poor decisions, make mistakes, etc.). Know who are your Elevated Rights users and Monitor their usage. Consider Implementing an Insider Threat Program. Provide More Detailed Security Awareness Training for all Security and SCADA Operators – “Learn to Connect the Dots” Must Have an asset lifecycle process defined. All electronic assets come to an end of life, that pace appears to be accelerating for computer related assets. Subscribe to the Microsoft Support Lifecycle newsletter highlighting the retirement dates for products and service packs. Southern Company Gas Confidential Use Only 21 4. Utility Industry Cyber Security Challenges Events Lessons Learned (Continued) Lessons Learned Validate and Monitor all “trusted” third party network connections. Eliminate or firewall off “untrusted” third party networks. For remote access, validate and monitor two factor authentication for all remote access users. Look for usage patterns outside of “normal” – afterhours, extra long sessions, etc. Employ network segmentation to hamper the threat actors from easily moving laterally within the network. Employ security tools to look for existing or attempted Indicators of Compromise (file hashes, IP addresses, etc.) Southern Company Gas Confidential Use Only 22 4. Utility Industry Cyber Security Challenges Events Lessons Learned (Continued) Lessons Learned Having a formal vulnerability management program and incident response plan is critical to assess the risk, impact, and response to emerging vulnerabilities. At home, change all your passwords if use the same one on multiple sites and one of the those sites had a vulnerability or breach. Consider “freezing” your credit with the credit bureaus. Don't do your home banking from an XP PC or Laptop. Replace your old Hardware and vulnerable Operating System Software. Configure your web browser to not use insecure SSL/TLS versions. Test your most common web sites you access for compatibility. Southern Company Gas Confidential Use Only 23 Questions? Email me at: [email protected] Southern Company Gas and Confidential Use Only 24 Appendix: How to Stay Vigilant at Home @ Home You Can: • Replace your XP PC or Laptop with Windows 10 • Turn Your Home Computer off When Not in Use • Embrace Password Complexity Rules – Develop a System to Make Complexity Easier – Picture, Calendar, etc. • Use Encrypted Portable Storage for Confidential Data – DVD’s or USB Stick – Always Back Up Your Data • Don’t Click on an Email Attachment You Are Not Expecting • Learn how to recognize mismatched email headers – sender is not from the domain indicated in the header. • If the Victim of a Data Breach, Use the Credit Monitoring Service Provided to You. Freeze Your Credit! Southern Company Gas Confidential Use Only 25 3D. Utility Industry Cyber Security Challenges – Events PG&E Metcalf Sub-Station Attack PG&E Metcalf Substation Attack5 Disorganized Event on April 16th 2013 where Attackers Shot Up a San Jose Electric Substation Included Physical and Cyber Security Attack Vectors No One has ever been Identified or Claimed Responsibility Prompted Utilities to Examine Their Own Facility and Asset Security Measures. Southern Company Gas Confidential Use Only 26 I. Utility Industry Cyber Security Challenges – Events Appendix – Target Data Breach - 2013 Target Data Breach: Malware Deployed to Target POS Systems – 11/28/134 Target Acknowledges Breach - 12/18/13 Target Confirms Malware Components Target SOC Received Security Alerts from their Tools and Dismissed Them Without any Action Southern Company Gas Confidential Use Only 27 II. Utility Industry Cyber Security Challenges – Events Appendix - Heartbleed Vulnerability – 2014 Heartbleed Vulnerability: Issue with specific versions of OpenSSL which is used to encrypt data transmissions, especially on the internet. This Vulnerability was known by NSA for at least two years before its existence was made public. Who else knew? Utilities had to check their own systems and inquire about those of their business partners. Employ fix - patch system if needed, replace certificate, and force users to change passwords. Southern Company Gas Confidential Use Only 28 III. Utility Industry Cyber Security Challenges – Events Appendix - Poodle Vulnerability 2015 Poodle Vulnerability: "Padding Oracle On Downgraded Legacy Encryption” - Man in the Middle Exploit that takes advantage of flaws in SSL and TLS Security. This Vulnerability Identified by Google in October, 2014. Though not as bad as Heartbleed (see Appendix), this still affects about 50% of the World’s Users. Communicate to users that your Company is going to Disable TLS 1.0 before 6/30/2016 (the PCI DSS Certification cut off date) Southern Company Gas Confidential Use Only 29 IV. Utility Industry Cyber Security Challenges – Appendix - Anthem Data Breach - 2015 Anthem Data Breach: Discovered 1/27/15 by DBA who Saw a database job running Under his ID. Breach Disclosed 2/04/15 80,000,000 Records Disclosed – Names, DOB, SSN, street addresses, email addresses and employment information, including income. No Additional Details of Hack Available – Though it Involved use of WE11POINT.COM and has been Attributed to China Southern Company Gas Confidential Use Only 30 Works Cited • 1 http://Wikipedia.com/ 14 April 2014 • 2 http://www.seti.org/ started in 1971, public cloud computing in 1999 • 3 https://cloudsecurityalliance.org/ • 4 Inside A Targeted Point-of-Sale Data Breach Dell Secureworks • http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-aTargeted-Point-of-Sale-Data-Breach.pdf • 5 Assault on California Power Station Raises Alarm on Potential for Terrorism Wall Street Journal February 5, 2014 • http://online.wsj.com/news/articles/SB1000142405270230485110457935 9141941621778 •6 Sandworm , iSIGHT Partners Inc. 2014 •7 http://www.darkreading.com/attacks-breaches/deconstructing-the-cyberkill-chain/a/d-id/1317542?image_number=1 Southern Company Gas Confidential Use Only 31 Works Cited • 7 Defending Against the Dragonfly Cyber Security Attacks, • Joel T. Langill, written for Belden, 10 December 2014 • 8 http://krebsonsecurity.com/2015/06/how-i-learned-to-stop-worrying-andembrace-the-security-freeze/ Brian Krebs 08 June 2015 • 9 Analysis of the Cyber Attack on the Ukrainian Power Grid, • SANS Industrial Control Systems with the Electricity Information Sharing and Analysis Center, March 18, 2016. • 10 http://veriscommunity.net/enums.html#section-actions • 11 Securion – www.Securion.io • 12 Meet The Millennials American Gas Magazine, June 2016. See The History of Data Breaches At: http://www.informationisbeautiful.net/visualizations/worlds-biggest-databreaches-hacks/ Southern Company Gas Confidential Use Only 32
© Copyright 2026 Paperzz